


default search action
Automatic Control and Computer Sciences, Volume 53
Volume 53, Number 1, January 2019
- Dmitry V. Efanov

, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov:
Using Codes with Summation of Weighted Bits to Organize Checking of Combinational Logical Devices. 1-11 - Qinli Zhang, Yu Chen:

An Improved Generalized Fuzzy Model Based on Epanechnikov Quadratic Kernel and Its Application to Nonlinear System Identification. 12-21 - Dmitriy V. Speranskiy:

About the Stability of Fuzzy Linear Automata. 22-27 - Madara Gasparovica-Asite, Ludmila Aleksejeva:

Classification Methodology for Bioinformatics Data Analysis. 28-38 - Alexander V. Babash, Valery A. Sizov, Andrey A. Mikrukov

:
Security Evaluation of a Brute-force Attack on a Cipher Using a Statistical Criterion for Plaintext. 39-44 - Rasim M. Alguliyev

, Yadigar N. Imamverdiyev, Fargana J. Abdullayeva
:
PSO-based Load Balancing Method in Cloud Computing. 45-55 - Wei Yanli, Qian Chaoyang, Li Jun:

Modular Design of Mobile APP Interface Based on the Visual Flow. 56-62 - Dmitry Namiot

, Manfred Sneps-Sneppe:
On Bikes in Smart Cities. 63-71 - Diqun Yan

, Li Xiang, Zhifeng Wang
, Rangding Wang:
Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum. 72-79 - Qingquan Liu, Zheyuan Bi, Rui Ding, Fang Jin:

A Lower Bound on Data Rates for Observability and Stabilizability of Linear Systems. 80-89 - Aldis Baums:

Mobile Robot Performance at Restricted Energy and Autonomy. 90-95
Volume 53, Number 2, March 2019
- Vladimir N. Shashihin:

Synthesis of Control for Nonlinear Systems. 97-106 - A. S. Rybakov:

Sampling and Estimating the Waveform of Analog Signals Based on Precision Event Timing. 107-115 - Mohammad Babaie, Zahra Rahmani Cherati

, Behrooz Rezaie
:
Designing a Switching Controller Based on Control Performance Assessment Index and a Fuzzy Supervisor for Perturbed Discrete-Time Systems Subject to Uncertainty. 116-126 - Jaydeep Swarnakar

, Prasanta Sarkar
, Lairenlakpam Joyprakash Singh:
Direct Discretization Method for Realizing a Class of Fractional Order System in Delta Domain - a Unified Approach. 127-139 - Yun Zhang:

Study on the Attacking Intelligent Decision-Making Technology Based on the Game Theory. 140-147 - Masuma H. Mammadova

, Zarifa Jabrayilova
:
Methods Managing for Matching of Supply and Demand on the IT Specialists. 148-158 - Gundala Swathi

:
Refining the Renowned Route Performance on Location Information About Mobile Adhoc Network. 159-168 - Liyi Zhang, Yang Gao, Yunshan Sun, Teng Fei, Yujing Wang:

Application on Cold Chain Logistics Routing Optimization Based on Improved Genetic Algorithm. 169-180 - Alexander N. Sychev

:
Application of Walsh Spectral Representations in Soft Computing. 181-185 - Yang Li, Ding Kai, Ji Maorong, Qiang Liu, Liu Xiaofeng:

Research and Experiment on UWB Path Loss Characteristics in Outdoor Near-Ground Environments. 186-193 - Yu Wang, Xiaomeng Chen, Huan Jiang, Qian Cao, Xiuxin Chen:

Applying Space-Variant Point Spread Function to Three-Dimensional Reconstruction of Fluorescence Microscopic Images. 194-201
Volume 53, Number 3, May 2019
- Nacereddine Djelal, Nadia Saadia, Amar Ramdane-Cherif:

Adaptive Force-Vision Control of Robot Manipulator Using Sliding Mode and Fuzzy Logic. 203-213 - Adil Khan

, Feng Jiang, Shaohui Liu, Ibrahim Omara
:
Playing a FPS Doom Video Game with Deep Visual Reinforcement Learning. 214-222 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval, Juris Krasts:

A New Technique of Intelligent Constructing Unbiased Prediction Limits on Future Order Statistics Coming from an Inverse Gaussian Distribution under Parametric Uncertainty. 223-235 - Xiaojing Li, Dongman Yu:

Study on an Optimal Path Planning for a Robot Based on an Improved ANT Colony Algorithm. 236-243 - Zhihuang Jiang:

Traffic Operation Data Analysis and Information Processing Based on Data Mining. 244-252 - A. I. Povoroznyuk, Anna E. Filatova, Alexander Yurievich Zakovorotniy, Kh. Shehna:

Development of Method of Matched Morphological Filtering of Biomedical Signals and Images. 253-262 - Zhi Liu, Mengmeng Zhang, Shipeng Dou, Changzhi An:

An Improved Intra Block Copy Algorithm Based on Character Segmentation. 263-269 - Karel Dudácek, Karel Dudácek:

Trellis-Based Postprocessing for Short Delay Measurement Using NDFT. 270-280 - Jingyu Zhang, Jianfu Teng, Yu Bai:

Improving Sparse Compressed Sensing Medical CT Image Reconstruction. 281-289
Volume 53, Number 4, July 2019
- Vladimir Aristov:

Influence of Nonlinearity of Fast Sawtooth Voltage on Stroboscopic Transformation of Signals in Receivers of Sensors Locators. 291-297 - Sergei Osadchy, Valeriy A. Zozulya, Anatoliy P. Ladanyuk, Larisa G. Vikhrova, Viktor M. Kalich:

Optimal Robust Control of a Robots Group. 298-309 - Nanditha Nair, K. V. Santhosh:

Sensor Fault Isolation in a Liquid Flow Process Using Kalman Filter. 310-319 - Narek Abroyan:

Using Hybrid Discriminative-Generative Models for Binary Classification. 320-327 - R. Pradeep, Mittapalle Kiran Reddy

, K. Sreenivasa Rao:
LSTM-Based Robust Voicing Decision Applied to DNN-Based Speech Synthesis. 328-332 - Muhammad Taseer Suleman, Shahid Mahmood Awan

:
Optimization of URL-Based Phishing Websites Detection through Genetic Algorithms. 333-341 - Shumin Xue, Chengjuan Ren:

Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment. 342-350 - Adriana Lipovac

, Edvin Skaljo
, Vlatko Lipovac
, Pamela Njemcevic:
Practical Prediction of CFO-Made OFDM Symbol Distortion. 351-363 - Gian Luigi Gragnani

, Daniele D. Caviglia, Claudio Montecucco:
Design of Printed log-Periodic Antennas for Long Range Communication within a Wireless Sensor Network for Sea Water Quality Monitoring. 364-375 - P. Efstratiou, Ioannis D. Moscholios:

User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies. 376-386
Volume 53, Number 5, September 2019
- Daria S. Lavrova, Elizaveta Zaitseva, Dmitry P. Zegzhda:

Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time. 387-392 - Helmi Abrougui, Habib Dallagi, Samir Nejim:

Autopilot Design for an Autonomous Sailboat Based on Sliding Mode Control. 393-407 - Alireza Rezaee, S. M. Mehdi Hoseini:

Parameter Identification of Induction Motor by Using Cooperative-Coevolution and a Nonlinear Estimator. 408-418 - Naveen Bindra, Manu Sood:

Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset. 419-428 - Yanjiao Wang, Ye Chen:

Coverage-All Targets Algorithm for 3D Wireless Multimedia Sensor Networks Based on the Gravitational Search Algorithm. 429-440 - Abdulraqeb Alhammadi

, Mardeni Roslee, Mohammad Yusoff Alias, Ibraheem Shayea
, Saddam Alraih:
Self-optimization of Handover Control Parameters for Mobility Management in 4G/5G Heterogeneous Networks. 441-451 - Li Wang, Zhi Lan, Qiang Wang, Rong Yang, Hongliang Li:

ELM_Kernel and Wavelet Packet Decomposition Based EEG Classification Algorithm. 452-460 - Abdelhak Bouhali, Daoud Berkani:

MAD-based Estimation of the Noise Level in the Contourlet Domain. 461-470 - Zhi Liu, Mengmeng Zhang, Delun Lai, Changzhi An:

A Novel Fast Partition Algorithm Based on EDGE Information in HEVC. 471-479 - Nikolajs Bogdanov

, Arnis Ancans
, K. Martinsons, Ernests Petersons
:
Erratum to: Estimating the Speed of an Integrated Wireless Network for Transportation Applications. 480
Volume 53, Number 6, November 2019
- Dmitry V. Efanov, Valery V. Sapozhnikov, Vladimir V. Sapozhnikov, Dmitrii V. Pivovarov:

Synthesis of Built-in Self-Test Control Circuits Based on the Method of Boolean Complement to Constant-Weight 1-out-of-n Codes. 481-491 - Soumia Bouzid, Messaoud Ramdani, Salah Chenikher:

Quality Fuzzy Predictive Control of Water in Drinking Water Systems. 492-501 - Victor Vladimirovich Deryabin:

Neural Networks Based Prediction Model for Vessel Track Control. 502-510 - Ameni Jouila, Najib Essounbouli, Khaled Nouri, Abdelaziz Hamzaoui:

Robust Nonsingular Fast Terminal Sliding Mode Control in Trajectory Tracking for a Rigid Robotic Arm. 511-521 - Yingying Feng, Shasha Zhao, Hui Liu:

Target Tracking Based on Multi Feature Selection Fusion Compensation in Monitoring Video. 522-531 - Nicholas A. Nechval, Gundars Berzins, Konstantin N. Nechval:

Intelligent Constructing Exact Statistical Prediction and Tolerance Limits on Future Random Quantities for Prognostics and Health Management of Complex Systems. 532-549 - Huixian Yang, Weifa Gan, Fan Chen, Jinfang Zeng:

Cropped and Extended Patch Collaborative Representation Face Recognition for a Single Sample Per Person. 550-559 - Chuan Lin, Hao-Jun Zhao, Yijun Cao:

Improved Color Opponent Contour Detection Model Based on Dark and Light Adaptation. 560-571 - Liyi Zhang, Yang Gao, Yunshan Sun, Teng Fei, Yujing Wang:

Erratum to: Application on Cold Chain Logistics Routing Optimization Based on Improved Genetic Algorithm. 572
Volume 53, Number 7, December 2019
- M. M. Abbas, Vladimir A. Zakharov:

Even Simple π-Calculus Processes Are Difficult to Analyze. 573-583 - Natalya Olegovna Garanina, Igor S. Anureev, Olesya Borovikova:

Verification-Oriented Process Ontology. 584-594 - Nikolay V. Shilov

, Dmitry A. Kondratyev
, Igor S. Anureev, Evgeny V. Bodin, Alexey V. Promsky:
Platform-Independent Specification and Verification of the Standard Mathematical Square Root Function. 595-616 - A. A. Kalenkova, D. A. Kolesnikov:

Application of a Genetic Algorithm for Finding Edit Distances between Process Models. 617-627 - E. V. Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin, Vladimir A. Bashkin

:
Application of Neural Networks for Recognizing Rail Structural Elements in Magnetic and Eddy Current Defectograms. 628-637 - Maria Karyaeva, Pavel Braslavski

, Valery Sokolov:
Word Embedding for Semantically Related Words: An Experimental Study. 638-643 - Mikhail V. Nevskii:

On Some Problems for a Simplex and a Ball in ℝn. 644-652 - Dmitry A. Kondratyev

, Ilya V. Maryasov
, Valery A. Nepomniaschy:
The Automation of C Program Verification by the Symbolic Method of Loop Invariant Elimination. 653-662 - Anton R. Gnatenko, Vladimir A. Zakharov:

On the Expressive Power of Some Extensions of Linear Temporal Logic. 663-675 - J. L. Vega Vice, Yuri V. Mikhailov:

On Methods of the Verification and Elaboration of Development Programs for Agricultural Territories. 676-682 - Sergey M. Dudakov

:
On Safety of Unary and Nonunary IFP Operators. 683-688 - Alexandra Igorevna Kononova

:
Dynamic Model of Information Exchange Processes in a Peer-to-Peer Network. 689-698 - D. R. Filonov, D. Ju. Chalyy, Dmitriy Mikhailovich Murin, Valery G. Durnev

, Valery A. Sokolov:
A Question-Answering System for Applicant Support Using Modern Messaging Apps. 699-704 - Nadezhda S. Lagutina, Ksenia V. Lagutina, A. S. Adrianov, Ilya V. Paramonov

:
Russian-Language Thesauri: Automatic Construction and Application for Natural Language Processing Tasks. 705-718 - Yu. V. Kosolapov

, A. N. Shigaev:
On the Support Splitting Algorithm for Induced Codes. 719-729 - L. I. Rodina, I. I. Tyuteev:

Estimating the Average Temporal Benefit in Probabilistic Environmental-Economic Models. 730-737 - A. N. Kirillov, I. V. Danilova:

Dynamics of Population Distribution by Patches. 738-744 - K. V. Vedenev

, Vladimir M. Deundyak:
Codes in a Dihedral Group Algebra. 745-754 - Pavel N. Nesterov

:
Asymptotic Integration of Certain Differential Equations in Banach Space. 755-768 - S. M. Terekhov, V. A. Nemtinov, K. S. Kornilov:

A Mathematical Model for Optimal Number of Heat Consumers Connection to the Heat Supply System. 769-778 - S. E. Vaganov, S. I. Khashin:

Comparison of Doubling the Size of Image Algorithms. 779-786 - O. Yu. Maryasin, A. S. Kolodkina, A. A. Ogarkov:

Computer Simulation of a Smart Building. 787-793 - Yu. N. Artamonov:

Building a Data Store with the Dynamic Structure. 794-810 - Andrey Velichko

, Valeriya V. Gribova
, Leonid A. Fedorishchev:
Cloud Service for Interactive Simulation of Interregional Trade Flows. 811-820 - V. N. Boykov, M. S. Karyaeva:

Poetology: Problems of Constructing a Thesaurus and Verse Text Specification. 821-823 - D. A. Makarov:

Synthesis of Control and State Observer for Weakly Nonlinear Systems Based on the Pseudo-Linearization Technique. 824-829 - Nadezhda S. Lagutina, Ksenia V. Lagutina, Ivan Shchitov, Ilya V. Paramonov

:
Analysis of Influence of Different Relations Types on the Quality of Thesaurus Application to Text Classification Problems. 830-838 - A. M. Tsirlin, Al. A. Akhremenkov:

Probabilistic Analysis of Tournament Organization Systems. 839-850 - V. A. Alexandrov, V. A. Desnitsky, D. Y. Chaly:

Design and Security Analysis of a Fragment of Internet of Things Telecommunication System. 851-856
Volume 53, Number 8, December 2019
- N. N. Shenets

:
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption. 857-864 - I. D. Pankov, Artem S. Konoplev, A. Yu. Chernov:

Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers. 865-869 - V. A. Lokhvitskii, Anatoly D. Khomonenko

, M. A. Bol'shakov:
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers. 870-873 - A. P. Baranov, P. A. Baranov:

Estimating the Probability of a Checksum Error in a Message. 874-878 - Elena B. Aleksandrova

, A. V. Yarmak
, Maxim O. Kalinin
:
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems. 879-882 - Sh. G. Magomedov, V. P. Los':

Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems. 883-888 - E. V. Malyshev, Dmitry A. Moskvin, Dmitry P. Zegzhda:

Application of an Artificial Neural Network for Detection of Attacks in VANETs. 889-894 - Maria A. Poltavtseva, Maxim O. Kalinin

:
Modeling Big Data Management Systems in Information Security. 895-902 - Maria A. Poltavtseva, Dmitry P. Zegzhda, Maxim O. Kalinin

:
Big Data Management System Security Threat Model. 903-913 - Maria A. Poltavtseva:

A Consistent Approach to Building Secure Big Data Processing and Storage Systems. 914-921 - Nikolai A. Grusho

:
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures. 922-931 - I. A. Sikarev, A. V. Garanin:

General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol. 932-936 - Elizaveta Zaitseva, Dmitry P. Zegzhda, Maria A. Poltavtseva:

Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems. 937-947 - Andrei D. Dakhnovich, Dmitry A. Moskvin, Dmitry P. Zegzhda:

An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things. 948-953 - Elena B. Aleksandrova

, Daria S. Lavrova, A. V. Yarmak
:
Benford's Law in the Detection of DoS Attacks on Industrial Systems. 954-962 - Denis V. Ivanov

, Dmitry A. Moskvin, G. S. Kubrin:
Detection of Security Threats to Modern Websites. 963-968 - Elena B. Aleksandrova

, E. N. Shkorkina, Maxim O. Kalinin
:
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users. 969-971 - Dmitry P. Zegzhda, Maxim O. Kalinin

, M. V. Levykin:
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series. 972-979 - Grigory B. Marshalko, L. O. Nikiforova:

Spoofing Attack on Eigenfaces-Based Biometric Identification System. 980-986 - I. V. Luskatov, S. V. Pilkevich:

Model for Identifying Cyber Threats to Internet Information Resources. 987-994 - Wang Lyanpen, O. G. Petrosyan, Jianming Du

:
Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation. 995-1005 - Vasiliy M. Krundyshev:

Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks. 1006-1011 - Vasiliy M. Krundyshev:

Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems. 1012-1016 - E. Yu. Pavlenko

:
Model of Cyberattacks on Digital Production Systems. 1017-1019 - E. Yu. Pavlenko

:
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model. 1020-1022 - Daria S. Lavrova:

Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks. 1023-1025 - Daria S. Lavrova:

Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems. 1026-1028 - Elena Doynikova

, Andrey Fedorchenko, Igor V. Kotenko
:
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions. 1029-1037 - V. G. Anisimov, Peter D. Zegzhda

, E. G. Anisimov, T. N. Saurenko, V. V. Kasatkin:
Model and Method for Optimizing Computational Processes in Parallel Computing Systems. 1038-1044 - R. A. Ognev, E. V. Zhukovskii, Dmitry P. Zegzhda:

Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls. 1045-1055 - N. A. Semenov, A. A. Poltavtsev:

Cloud-Based Data Architecture Security. 1056-1064 - Daria S. Lavrova, E. A. Popova, Anna A. Shtyrkina

:
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters. 1065-1071

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














